This page uses content from Wikipedia and is licensed under CC BY-SA.
Ethash is the proof-of-work function in Ethereum-based blockchain currencies. It uses Keccak, a hash function eventually standardized to SHA-3. These two are different, and should not be confused. Since version 1.0, Ethash has been designed to be ASIC-resistant via memory-hardness (harder to implement in special ASIC chips) and easily verifiable. It also uses a slightly modified version of earlier Dagger and Hashimoto hashes to remove computational overhead. Previously referred to as Dagger-Hashimoto, the Ethash function has evolved over time. Ethash uses an initial 1 GB dataset known as the Ethash DAG and a 16 MB cache for light clients to hold. These are regenerated every 30,000 blocks, known as an epoch. Miners grab slices of the DAG to generate mix-hashes using transaction and receipt data, along with a cryptographic nonce to generate a hash below a dynamic target difficulty.
In April 2018, the first ASIC miners for Ethash, the ASIC-resistant hash, were announced by Bitmain. Fear of over-influence from Bitmain and 51% attacks prompted discussions of bricking the devices, forcing ASIC miners into hard-mode mining, or continuing or expediting development and eventual release of Casper. It is thought that ASIC miners are not a threat to Ethereum.[by whom?] It was decided that Ethereum would switch from its pure proof of work to a hybrid Proof of Work and Proof of Stake scheme called "Casper the Friendly Finality Gadget" (FFG), where every 1 in 50 blocks is created with Proof of Stake for partial finality (the prevention of new forks). On a future hard fork yet to be decided, Ethereum will produce all new blocks with Proof of Stake through a separate design of Casper, known as "Casper the Friendly GHOST" or sometimes "Casper Correct-By-Construction" (CBC), and Ethash will be officially deprecated on the main Ethereum blockchain due to an exponential rise in mining difficulty. Other blockchains utilizing Ethash (including the Ethereum Foundation's Ropsten test network) have not announced plans to deprecate its use.
|This algorithms or data structures-related article is a stub. You can help Wikipedia by expanding it.|
|This cryptography-related article is a stub. You can help Wikipedia by expanding it.|